{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:09:51Z","timestamp":1725804591605},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_8","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T10:55:22Z","timestamp":1410000922000},"page":"113-128","source":"Crossref","is-referenced-by-count":5,"title":["A Formal Model for Soft Enforcement: Influencing the Decision-Maker"],"prefix":"10.1007","author":[{"given":"Charles","family":"Morisset","sequence":"first","affiliation":[]},{"given":"Iryna","family":"Yevseyeva","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Gro\u00df","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1595676.1595684","volume-title":"Proceedings of the 2008 Workshop on New Security Paradigms, NSPW 2008","author":"A. Beautement","year":"2008","unstructured":"Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: Managing security behaviour in organisations. In: Proceedings of the 2008 Workshop on New Security Paradigms, NSPW 2008, pp. 47\u201358. ACM, New York (2008)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Boella, G., van der Torre, L.W.N.: A game-theoretic approach to normative multi-agent systems. In: Normative Multi-agent Systems. Dagstuhl Seminar Proceedings, vol.\u00a007122 (2007)","DOI":"10.1007\/978-3-540-75254-7_5"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: Security and Privacy 2007, pp. 222\u2013230. IEEE (2007)","DOI":"10.1109\/SP.2007.21"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-07668-3_23","volume-title":"Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience","author":"L.M. Coventry","year":"2014","unstructured":"Coventry, L.M., Briggs, P., Jeske, D., van Moorsel, A.P.A.: Scene: A structured means for creating and evaluating behavioral nudges in a cyber security environment. In: Marcus, A. (ed.) DUXU 2014, Part I. LNCS, vol.\u00a08517, pp. 229\u2013239. Springer, Heidelberg (2014)"},{"issue":"2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.joep.2011.10.009","volume":"33","author":"P. Dolan","year":"2012","unstructured":"Dolan, P., Hallsworth, M., Halpern, D., King, D., Metcalfe, I.V.R.: Influencing behaviour: The mindspace way. Journal of Economic Psychology\u00a033(2), 264\u2013277 (2012)","journal-title":"Journal of Economic Psychology"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-319-07620-1_28","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"A. Ferreira","year":"2014","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G.: A conceptual framework to study socio-technical security. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol.\u00a08533, pp. 318\u2013329. Springer, Heidelberg (2014)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-41098-7_9","volume-title":"Security and Trust Management","author":"A. Ferreira","year":"2013","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., Rivas, S.: Socio-technical study on the effect of trust and context when choosing wiFi names. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol.\u00a08203, pp. 131\u2013143. Springer, Heidelberg (2013)"},{"key":"8_CR8","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-55415-5_2","volume-title":"ICT Systems Security and Privacy Protection","author":"A. Fielder","year":"2014","unstructured":"Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., Smeraldi, F.: Game theory meets information security management. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IFIP AICT, vol.\u00a0428, pp. 15\u201329. Springer, Heidelberg (2014)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1007\/978-3-642-40203-6_32","volume-title":"Computer Security \u2013 ESORICS 2013","author":"A. Griesmayer","year":"2013","unstructured":"Griesmayer, A., Morisset, C.: Automated certification of authorisation policy resistance. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol.\u00a08134, pp. 574\u2013591. Springer, Heidelberg (2013)"},{"key":"8_CR10","unstructured":"Kahneman, D.: Thinking, fast and slow. Farrar, Straus and Giroux (2011)"},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D. Kahneman","year":"1979","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: An analysis of decision under risk. Econometrica\u00a047(2), 263\u2013291 (1979)","journal-title":"Econometrica"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-27576-0_9","volume-title":"Financial Cryptography and Data Security","author":"D. Liu","year":"2012","unstructured":"Liu, D., Li, N., Wang, X., Camp, L.J.: Beyond risk-based access control: Towards incentive-based access control. In: Danezis, G. (ed.) FC 2011. LNCS, vol.\u00a07035, pp. 102\u2013112. Springer, Heidelberg (2012)"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1037\/1082-989X.7.1.83","volume":"7","author":"D.P. MacKinnon","year":"2002","unstructured":"MacKinnon, D.P., Lockwood, C.M., Hoffman, J.M., West, S.G., Sheets, V.: A comparison of methods to test mediation and other intervening variable effects. Psychological Methods\u00a07(1), 83 (2002)","journal-title":"Psychological Methods"},{"issue":"3","key":"8_CR14","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2480741.2480742","volume":"45","author":"M.H. Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Bac\u015far, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Computing Surveys\u00a045(3), 25 (2013)","journal-title":"ACM Computing Surveys"},{"issue":"6-7","key":"8_CR15","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.cose.2011.03.001","volume":"30","author":"I.J. Martinez-Moyano","year":"2011","unstructured":"Martinez-Moyano, I.J., Conrad, S.H., Andersen, D.F.: Modeling behavioral considerations related to information security. Computers & Security\u00a030(6-7), 397\u2013409 (2011)","journal-title":"Computers & Security"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Molloy, I., Cheng, P.-C., Rohatgi, P.: Trading in risk: using markets to improve access control. In: NSPW, pp. 107\u2013125 (2008)","DOI":"10.1145\/1595676.1595694"},{"key":"8_CR17","unstructured":"Morisset, C., Gro\u00df, T., van Moorsel, A., Yevseyeva, I.: Formalization of influencing in information security. Technical Report CS-TR-1423, Newcastle University (May 2014)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-319-07620-1_30","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"C. Morisset","year":"2014","unstructured":"Morisset, C., Gro\u00df, T., van Moorsel, A., Yevseyeva, I.: Nudging for quantitative access control systems. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol.\u00a08533, pp. 340\u2013351. Springer, Heidelberg (2014)"},{"key":"8_CR19","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) Version 3.0, Committee Specification 01 (2010)"},{"issue":"4","key":"8_CR20","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.cose.2011.12.010","volume":"31","author":"S.L. Pfleeger","year":"2012","unstructured":"Pfleeger, S.L., Caputo, D.D.: Leveraging behavioral science to mitigate cyber security risk. Computers & Security\u00a031(4), 597\u2013611 (2012)","journal-title":"Computers & Security"},{"issue":"0","key":"8_CR21","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.scico.2013.05.003","volume":"83","author":"C.D.P.K. Ramli","year":"2014","unstructured":"Ramli, C.D.P.K., Nielson, H.R., Nielson, F.: The logic of XACML. Science of Computer Programming\u00a083(0), 80\u2013105 (2014)","journal-title":"Science of Computer Programming"},{"key":"8_CR22","unstructured":"Sternberg, S.: Discovering mental processing stages: The method of additive factors. In: Methods, Models, and Conceptual Issues: An Invitation to Cognitive Science, pp. 703\u2013863. The MIT Press (1998)"},{"key":"8_CR23","unstructured":"Thaler, R.H., Sunstein, C.R.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press, New Haven (2008)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Vaniea, K., Bauer, L., Cranor, L.F., Reiter, M.K.: Out of sight, out of mind: Effects of displaying access-control information near the item it controls. In: PST, pp. 128\u2013136 (2012)","DOI":"10.1109\/PST.2012.6297929"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T20:17:08Z","timestamp":1558988228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}